Font Size: a A A

The Energy Of The Rsa Public Key Cryptography Algorithm Analysis Attack And Defense

Posted on:2007-07-04Degree:MasterType:Thesis
Country:ChinaCandidate:X LiFull Text:PDF
GTID:2208360185956611Subject:Cryptography
Abstract/Summary:PDF Full Text Request
With the rapid development of modern information technology, the information security plays a more and more important role. As the core and the foundation of information security, the cryptography, especially the security of cryptographic algorithms, is the focus of correlated researches and discussions in the world.Generally, mathematical theory and deduction are used to explore the weakness of cryptographic algorithms, so that the complicated mathematical knowledge and enormous consumption are needed. At the same time, as a result of the design scientifically, there is no practical significance to conquer the cryptographic algorithm by mathematical methods. The power analysis attacks are different from the traditional attacking mode. They are used to collect and analyze the valuable information of algorithms from the power consumption traces which are monitored when cryptographic devices are working and becoming one of the most effective Side Channel Attacks. And among the all of cryptographic algorithms, the RSA is the most widespread and securest public key algorithm in the world.The power analysis attacks and the corresponding countermeasures to RSA and its improved algorithm RSA-CRT have been discussed in detail in this thesis.On the research of power analysis attacks, the attack principles and operation methods of SPA and DPA are introduced first, then the concrete algorithms to RSA and RSA-CRT are investigated separately: the SPA attacking algorithm for RSA is given and the DPA attacking algorithm for RSA is improved, three different algorithms which are based on the different preconditions are summarized; the SPA and DPA attacking algorithms for RSA-CRT are presented, then a new attacking algorithm named quadratic equation algorithm is proposed based on the discussion before. The quadratic equation algorithm utilizes SPA, DPA and principle of RSA-CRT, converts the complicated prime factorization of a large composite number into finding the solution of a quadratic equation and gains the private key at last.On the research of corresponding countermeasures, by analyzing and discussing the vulnerabilities to SPA, DPA for RSA and RSA-CRT, the improved algorithms and...
Keywords/Search Tags:RSA, power analysis, SPA, DPA, simulation
PDF Full Text Request
Related items